+ All Categories
Home > Documents > Privacy Challenge

Privacy Challenge

Date post: 05-Jan-2016
Category:
Upload: lraman87
View: 216 times
Download: 0 times
Share this document with a friend
Description:
Privacy Challenge

of 36

Transcript
  • Electronic copy available at: http://ssrn.com/abstract=2501699

    748 UNSW Law Journal Volume 37(2)

    THE CHALLENGE TO PRIVACY FROM EVER INCREASING STATE SURVEILLANCE: A COMPARATIVE PERSPECTIVE

    KONRAD LACHMAYER* AND NORMANN WITZLEB**

    I INTRODUCTION A The 9/11 Effect1

    Terrorism was not invented with the September 11, 2011 (9/11), terrorist attacks on the United States. Nevertheless, the coordinated attacks that killed almost 3,000 people were unprecedented as a single act of terrorism. So, too, was the global response to those events. Although individual countries had panicked and reacted to terrorism with repressive and ineffective laws and measures before, the response to 9/11 was an unprecedented global phenomenon. All countries responded in a manner that reflected their own particular histories and legal, political, and social cultures.2

    International terrorism poses serious threats to the societies it affects. The counter-terrorism measures adopted since 2001 have sought to limit the advance of terrorism but, in the process, also created enormous challenges for (transnational) constitutionalism. Long-held and cherished principles relating to democracy, the rule of law and the protection of a wide range of human rights have come under increasing strain. Legislative authority to shoot down hijacked aircrafts3 or to use lethal drones against suspected terrorists4 affect the right to * Priv-Doz Dr Konrad Lachmayer is a Senior Lecturer at the Department of Constitutional and

    Administrative Law at the University of Vienna and a Senior Researcher at the Institute of Legal Studies of the Hungarian Academy of Sciences. The research for this article has been facilitated by a Monash University Faculty of Law International Collaboration Grant. A former version of this article was presented at a workshop of the International Association of Constitutional Law Research Group on Constitutional Responses to Terrorism: Konrad Lachmayer, Rethinking Privacy beyond Borders (Paper presented at the Constitutionalism across Borders in the Struggle against Terrorism Workshop, Harvard Law School,7 March 2014).

    ** Dr Normann Witzleb is a Senior Lecturer at Monash University, Melbourne. 1 Kent Roach, The 9/11 Effect: Comparative Counterterrorism (Cambridge University Press, 2011). 2 Ibid 1. 3 Oliver Lepsius, Human Dignity and the Downing of Aircraft: The German Federal Constitutional Court

    Strikes Down a Prominent Anti-terrorism Provision in the New Air-Transport Security Act (2006) 7 German Law Journal 761, 76672.

    4 See David Cole, How We Made Killing Easy on NYRblog, The New York Review of Books, NYRblog (6 February 2013) ; Jamie L Kleidman, The Constitutionality of the Predator Drone Program (2010) 4 Vienna Journal on International Constitutional Law 359.

  • Electronic copy available at: http://ssrn.com/abstract=2501699

    2014 Thematic: The Challenge to Privacy 749

    life; waterboarding of prisoners and other inhumane practices contravene the prohibition of torture; 5 extraordinary renditions and black sites circumvent constitutionally protected rights and processes, including the right to freedom and security,6 the right to a fair trial and due process for suspected terrorists;7 ill-defined terrorism offences undermine the rule of law and personal freedom; 8 blanket suspicion of Muslims as terror sympathisers impacts on freedom of religion and leads to unfair discrimination;9 and mass surveillance of communication sweeps away the right to privacy.

    This article explores how internet surveillance in the name of counter-terrorism challenges privacy. In Part II, the article analyses the international dimension of counter-terrorism measures and the conceptualisation of data protection and privacy in the European Union (EU), the United States of America (US) and Australia. Part III compares the different concepts of data protection and privacy, and explores the prospects of an international legal framework for the protection of privacy. Part IV concludes that work on international data protection and privacy standards, while urgently needed, remains a long-term vision with particularly uncertain prospects as far as anti-terrorism and national security measures are concerned.

    B The Privacy Challenge

    Counter-terrorism measures have broken many taboos regarding the rule of law in democratic countries. While torture, detention and interrogation target individuals in highly confronting ways, mass surveillance operates more subtly but affects the community at large. The erosion of core aspects of individual privacy can fundamentally alter the nature of human behaviour and interaction, our sense of personal freedom and the ethos of democratic societies.

    The revelations in particular by the former Central Intelligence Agency (CIA) contractor, Edward Snowden, have shown that massive surveillance of ordinary citizens on an unprecedented scale by law enforcement and national security agencies is now commonplace: it includes internet surveillance, video surveillance of public spaces, electronic eavesdropping, data retention, monitoring of bank accounts and social media, the sharing of air travel booking information, large scale intrusions into email, web chat and data held in cloud storage etc. Moreover, the different forms of data gathering can be combined

    5 See Jeremy Waldron, Torture and Positive Law: Jurisprudence for the White House (2005) 105

    Columbia Law Review 1681. 6 Johan Steyn, Guantanamo Bay: The Legal Black Hole (2004) 53 International and Comparative Law

    Quarterly 1. 7 Federico Fabbrini, The Role of the Judiciary in Times of Emergency: Judicial Review of Counter-

    Terrorism Measures in the United States Supreme Court and the European Court of Justice (2009) 28 Yearbook of European Law 664; Christina Eckes, EU Counterterrorist Policies and Fundamental Rights: The Case of Individual Sanctions (Oxford University Press, 2010).

    8 Roach, above n 1, 2279. 9 See Jocelyne Cesari (ed), Muslims in the West after 9/11: Religion, Politics and Law (Routledge, 2010).

  • Electronic copy available at: http://ssrn.com/abstract=2501699

    750 UNSW Law Journal Volume 37(2)

    with sophisticated data mining,10 dragnet investigations and big data analysis.11 Technological developments which result in ever-increasing amounts of data logging our communications and recording our daily activities create new possibilities for covert risk profiling and discriminatory treatment that are often beyond legal challenge. In their totality, these forms of information technology-based counter-terrorism measures raise serious constitutional concerns.

    The new possibilities for state surveillance to dig deep into our social interactions, behaviour, and personality do not stop at national borders. Data exchange between governments and agencies, cooperation with and inquiries at private companies, international agreements and security cooperation create new data that provide our own or foreign governments with further insight into our activities and intentions. Internet communications are subject to direct or indirect intrusion into computers, computer systems, clouds, private chat rooms, social media and email accounts.12 Access to telecommunication networks does not only include eavesdropping on our conversations but also many informational by-products, including metadata and, in the era of smartphones, geolocation data. Wiretapping, the use of spy satellites and traditional foreign espionage supplement these sources of information.

    These new surveillance practices are challenging the concept of privacy in many ways. Indeed, it can be asked how privacy can still be sensibly safeguarded in this new environment. In international human rights law, privacy enjoys significant but not unlimited protection. Article 12 of the Universal Declaration of Human Rights states that [n]o one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.13 Likewise, the International Covenant on Civil and Political Rights (ICCPR),14 the Convention for the Protection of Human Rights and Fundamental Freedoms, now known as the European Convention on Human

    10 Fred H Cate, Government Data Mining: The Need for a Legal Framework (2008) 43 Harvard Civil

    Rights Civil Liberties Law Review 435. 11 Viktor Mayer-Schnberger and Kenneth Cukier, Big Data: A Revolution That Will Transform How We

    Live, Work, and Think (Houghton Mifflin Harcourt, 2013). 12 Regarding the changing role of the individual in international conventions relating transborder data flows,

    see Christopher Kuner, Transborder Data Flows and Data Privacy Law (Oxford University Press, 2013) 367.

    13 Universal Declaration of Human Rights, GA Res 217A (III), UN GAOR, 3rd sess, 183rd plen mtg, UN Doc A/810 (10 December 1948). On the continuing relevance of the Universal Declaration, see Jochen von Bernstorff, The Changing Fortunes of the Universal Declaration of Human Rights: Genesis and Symbolic Dimensions of the Turn to Rights in International Law (2008) 19 European Journal of International Law 903.

    14 International Covenant on Civil and Political Rights, opened for signature 19 December 1966, 999 UNTS 171 (entered into force 23 March 1976) art 17. In relation to extraterritorial surveillance and interception of communication, there is also a jurisdictional issue of whether human rights instruments have application to foreign intelligence activities: see also Marko Milanovic, Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age (2014) forthcoming Harvard International Law Journal.

  • 2014 Thematic: The Challenge to Privacy 751

    Rights (ECHR),15 and the American Convention on Human Rights16 recognise respect for private life as a human right. Yet, privacy is not an absolute right. In practical terms, it is only guaranteed to the extent that it is not outweighed by countervailing public interests or by conflicting rights held by others. Under the ECHR, which probably contains the richest human rights jurisprudence relating to the right to privacy, conflicting human rights positions have to be resolved by reference to the principle of proportionality, under which each human right can only be limited as far as is necessary for the protection of the conflicting human rights. In the context of counter-terrorism measures, these will normally justify a curtailment of privacy for the protection of state security, public safety or public order.

    While there is a shared discourse on the framework of privacy protection at an international level, international human rights instruments tend to give states a margin of appreciation17 as to how privacy is to be effected and how it is to be balanced against conflicting public interests. This has resulted in significant differences concerning the nature and precise extent of privacy protection between jurisdictions. Even among liberal Western democracies, there is no consensus regarding the status that privacy should enjoy at a constitutional level. In some countries, for example, Germany, constitutional jurisprudence plays a pivotal role in the protection of privacy. In other countries, such as Australia, privacy is not a constitutionally protected value.

    Since the days of Warren and Brandeis,18 debate on privacy has always been shaped by new technological developments. However, the contemporary dimension of intrusion goes far beyond previously existing technologies and is powerfully supported by anti-terrorism rhetoric. Cultural concepts of privacy have always varied between different states and societies in the world but the contemporary and emerging techniques of intrusion into privacy create a new global standard of possibilities. Privacy protections no longer keep up with these developments: neither nationally with the aim of limiting government usage of the new surveillance technologies nor internationally with the aim of adopting 15 Convention for the Protection of Human Rights and Fundamental Freedoms, opened for signature 4

    November 1950, 213 UNTS 221 (entered into force 3 September 1953), as amended by Protocol No 14 to the Convention for the Protection of Human Rights and Fundamental Freedoms, Amending the Control System of the Convention, opened for signature 13 May 2004, CETS No 194 (entered into force 1 June 2010) art 8; see also Charter of Fundamental Rights of the European Union [2010] OJ C 83/389, arts 78.

    16 American Convention on Human Rights, signed 22 November 1969, 1144 UNTS 17955 (entered into force 18 July 1978).

    17 The margin of appreciation is a doctrine developed by the European Court of Human Rights. The term refers to the space for manoeuvre that is accorded to national authorities in fulfilling their obligations under the European Convention on Human Rights. The margin of appreciation differs depending on the circumstances of the case and the rights and freedoms engaged. See, eg, Dean Spielmann, Whither the Margin of Appreciation? (Speech delivered at the Current Legal Problems Lecture Series, University College London, 20 March 2014) .

    18 Samuel D Warren and Louis D Brandeis, The Right to Privacy (1890) 4 Harvard Law Review 193, 195 (referring to recent inventions such as [i]nstantaneous photographs).

  • 752 UNSW Law Journal Volume 37(2)

    universal standards of privacy protection. Safeguarding privacy in times of terrorism requires the reaffirmation of the rule of law nationally and an intercultural dialogue on privacy internationally.19

    II COUNTER-TERRORISM MEASURES AND THEIR IMPACT ON PRIVACY COMPARATIVE INSIGHTS

    A The European Union 1 Counter-Terrorism Surveillance Measures

    During the last decade, the EU intensified its counter-terrorism activities in many ways. 20 After 9/11, initiatives to improve EU police and judicial cooperation in criminal matters included a strong counter-terrorism component.21 The terrorist attacks in Madrid22 and London23 provided the political impetus for further expansion of these initiatives and led most prominently to the enactment of the so-called Data Retention Directive.24 Based on the EU competence of legal harmonisation in the common market,25 the Data Retention Directive aimed at harmonising the obligations of providers of public electronic communications services or networks to retain certain categories of traffic and location data generated or processed by them.26 The categories included data necessary to trace and identify the source and the destination of any electronic (tele)communication as well as the date, time, duration and type of this communication.27 While the Data Retention Directive expressly excluded retention of data revealing the content of the communication,28 it created a highly contentious basis for privacy invasion by state authorities. The CJEU struck down the Data Retention

    19 David Cole, Preserving Privacy in a Digital Age: Lessons of Comparative Constitutionalism, in Fergal

    Davis, Nicola McGarrity and George Williams (eds), Surveillance, Counter-Terrorism and Comparative Constitutionalism (Routledge, 2014) 95.

    20 See Cian C Murphy, EU Counter-Terrorism Law: Pre-emption and the Rule of Law (Hart Publishing, 2012).

    21 See, eg, The Hague Programme: Strengthening Freedom, Security and Justice in the European Union [2005] OJ C 53/1.

    22 The Madrid train bombings took place on 11 March 2004. 23 The London bombings took place on 7 July 2005. 24 Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the Retention

    of Data Generated or Processed in Connection with the Provision of Publicly Available Electronic Communications Services or of Public Communications Networks and Amending Directive 2002/58/EC [2006] OJ L 105/54 (Data Retention Directive). See, eg, Theodore Konstadinides, Mass Surveillance and Data Protection in EU Law The Data Retention Directive Saga in Maria Bergstrm and Anna Jonsson Cornell (eds), European Police and Criminal Law Cooperation (Hart Publishing, 2013) 69.

    25 The Court of Justice of the European Union (CJEU) rejected an action for annulment on the basis of lack of competence. See Ireland v European Parliament and Council of the European Union (Court of Justice of the European Union, C-301/06, 10 February 2009).

    26 Data Retention Directive [2006] OJ L 105/54, arts 1(1)(2). 27 Data Retention Directive [2006] OJ L 105/54, art 5. 28 Data Retention Directive [2006] OJ L 105/54, art 5(2).

  • 2014 Thematic: The Challenge to Privacy 753

    Directive in April 2014 as a disproportionate intrusion into the rights to privacy and data protection,29 yet it continues to illustrate the status of personal data protection in Europe.

    To understand its significance, it is important to recall some major elements of the Data Retention Directive. In its first recital the Data Retention Directive invoked data protection and the right to privacy; however, the Data Retention Directive primarily operated to limit and restrict these rights. While counter-terrorism provided the context for enacting the Data Retention Directive,30 the Data Retention Directive itself expressed its purposes more widely. The data had to be retained, for a period between six months and two years, to ensure that [they] are available for the purpose of the investigation, detection and prosecution of serious crime, as defined by each Member State in its national law.31 In other words, the Data Retention Directive provided each member state with wide discretion to define the parameters for use of the retained data by its police, the judiciary or intelligence agencies, having regard to its own institutional and constitutional framework.32 Its contested nature meant that the transposition of the Data Retention Directive into national law remained incomplete. When the German Constitutional Court declared the transposition of the Data Retention Directive into German law to be unconstitutional, the German government made no further attempt of transposition. 33 While the German Constitutional Court did not decide on compatibility of the Data Rentention Directive with the German Constitution, it held that the constitutional principle of proportionality demanded more detailed provisions regarding data security,

    29 See Digital Rights Ireland Ltd v Minister for Communications, Marine and Natural Resources; Krntner

    Landesregierung v Seitlinger (European Court of Justice, C-293/12; C-59/14, 8 April 2014) [58]. 30 See recital 10 of the Data Retention Directive [2006] OJ L 105/54: On 13 July 2005, the Council

    reaffirmed in its declaration condemning the terrorist attacks on London the need to adopt common measures on the retention of telecommunications data as soon as possible.

    31 Data Retention Directive [2006] OJ L 105/54, art 1(1). 32 The use of data was completely at the discretion of the member states. The Data Retention Directive only

    required the member states to adopt rules for data retention for telecommunication providers, but did not regulate in which form, if any, member state authorities used such data other than providing that the procedure and conditions for access

    in accordance with necessity and proportionality requirements shall be defined by each member state in its national law, subject to the relevant provisions of European Union law or public international law, and in particular the ECHR as interpreted by the European Court of Human Rights.

    Data Retention Directive [2006] OJ L 105/54, art 4. 33 Bundesverfassungsgericht [German Constitutional Court], 1 BvR 256/08, 2 March 2010 reported in

    (2010) BVerfGE 125, 260. See also Christian DeSimone, Pitting Karlsruhe against Luxembourg? German Data Protection and the Contested Implementation of the EU Data Retention Directive (2010) 11 German Law Journal 291.

  • 754 UNSW Law Journal Volume 37(2)

    transparency and legal protection in the German Act transposing the Data Retention Directive.34

    The majority of member states have limited the purpose of data retention to serious crime, but in 2011 there were eight member states which allowed its use in relation to all criminal offences and for crime prevention, or on general grounds of national or state and/or public security.35 The Data Retention Directive was not unusual in this regard.36 New police and judicial powers have often been introduced as counter-terrorism measures but have then been made available to all (or at least many others) forms of criminal activities, especially organised crime. Once anti-terrorism has been used as the political justification for introducing a particular measure, there is a temptation for police and other agencies to lobby for an expansion of the new powers to deal with other forms of criminality.

    The Data Retention Directive was just one, but a prominent, example of EU counter-terrorism policy.37 Other activities related to counter-terrorism and the use of personal data include the establishment and development of Europol,38 the establishment of EU Intelligence Analysis Centre,39 the Schengen Information System, 40 the Prm Convention, 41 European Criminal Records Information

    34 See with regard to legal challenges in other countries Chris Jones and Ben Hayes, The EU Data

    Retention Directive: A Case Study in the Legitimacy and Effectiveness of EU Counter-Terrorism Policy (Report No D2.4, Securing Europe through Counter-Terrorism: Impact, Legitimacy and Effectiveness, 7 November 2013) 22 .

    35 Report from the Commission to the Council and the European Parliament: Evaluation Report on the Data Retention Directive (Directive 2006/24/EC) [2011] COM(2011) 225, 6.

    36 See Maria Tzanou, The EU as an Emerging Surveillance Society: The Function Creep Case Study and Challenges to Privacy and Data Protection (2010) 4 Vienna Journal on International Constitutional Law 407.

    37 Francesca Bignami, Privacy and Law Enforcement in the European Union: The Data Retention Directive (2007) 8 Chicago Journal of International Law 233.

    38 See Council Decision of 6 April 2009 Establishing the European Police Office (Europol) (2009/371/JHA) [2009] OJ L 121/37; see also Proposal for a Regulation of the European Parliament and of the Council on the European Union Agency for Law Enforcement Cooperation and Training (Europol) and Repealing Decisions 2009/371/JHA and 2005/681/JHA, Communication [2013] COM(2013) 173.

    39 Rhodri Jeffreys-Jones, In Spies We Trust: The Story of Western Intelligence (Oxford University Press, 2013) 21229.

    40 See Jens-Peter Schneider, European Information Systems and Data Protection as Elements of the European Administrative Union in Dieter Drr and Russell L Weaver (eds), The Right to Privacy in the Light of Media Convergence: Perspectives from Three Continents (De Gruyter, 2012) 374, 3802.

    41 See Convention between the Kingdom of Belgium, the Federal Republic of Germany, the Kingdom of Spain, the French Republic, the Grand Duchy of Luxembourg, the Kingdom of the Netherlands and the Republic of Austria on the Stepping Up of Cross-Border Cooperation, Particularly in Combating Terrorism, Cross-Border Crime and Illegal Migration, signed 27 May 2005, 2617 UNTS 46562 (entered into force 1 November 2006) (Prm Convention); see also the implementation of the Prm Convention into the EU legal framework by Council Decision (2008/615/JHA) on the Stepping Up of Cross-Border Cooperation, Particularly in Combating Terrorism and Cross-border Crime [2008] OJ L 210/1 (Council Decision (2008/615/JHA)).

  • 2014 Thematic: The Challenge to Privacy 755

    System,42 and the attempts to establish a principle of availability in police cooperation 43 and to enact an EU Passenger Name Record (EU PNR) directive.44

    All these counter-terrorism measures have had a dimension extending beyond the EU. The Data Retention Directive did not focus on EU citizens but on all communications which utilised telecommunication infrastructure located in the EU.45 This affected all persons using the internet within the EU, but also persons outside the EU who used telecommunication providers and their services on EU territory or by EU providers. Moreover, the storage of data leads to communication data with regard to persons outside the Union, for example, if somebody inside the EU contacts a person, an email address or a website outside the EU.

    European counter-terrorism measures are enforced within the EU but they are intended to gain as much data as possible, also beyond the EU territory. The international reach, which is characteristic of the new forms of terrorism, requires cross-border strategies also for the fight against it. The EU is therefore part of international agreements to foster cooperation against international terrorism: the prominent examples are the Terrorist Finance Tracking Program Agreement (TFTP Agreement)46 and the Passenger Name Record Agreements (PNR Agreements)47 with the US or Australia. Other initiatives, like the efforts for an EU-PNR directive48 or Europols cooperation agreements with non-EU 42 See Council Framework Decision 2009/315/JHA on the Organisation and Content of the Exchange of

    Information Extracted from the Criminal Record between Member States [2009] OJ L 93/23; Council Decision 2009/316/JHA of 6 April 2009 on the Establishment of the European Criminal Records Information System (ECRIS) in Application of Article 11 of Framework Decision 2009/315/JHA [2009] OJ L 93/33.

    43 See The Hague Programme: Strengthening Freedom, Security and Justice in the European Union [2005] OJ C 53/1.

    44 See Proposal for a Directive of the European Parliament and of the Council on the Use of Passenger Name Record Data for the Prevention, Detection, Investigation and Prosecution of Terrorist Offences and Serious Crime [2011] COM(2011) 32.

    45 Data Retention Directive [2006] OJ L 105/54, art 3(2): The obligation to retain data provided for in paragraph 1 shall include the retention of the data specified in Article 5 relating to unsuccessful call attempts where those data are generated or processed, and stored (as regards telephony data) or logged (as regards Internet data), by providers of publicly available electronic communications services or of a public communications network within the jurisdiction of the Member State concerned in the process of supplying the communication services concerned.

    46 Agreement between the European Union and the United States of America on the Processing and Transfer of Financial Messaging Data from the European Union to the United States for the Purposes of the Terrorist Finance Tracking Program [2010] OJ L 195/5; see also Ariadna Ripoll Servent and Alex MacKenzie, The European Parliament as a Norm Taker? EU-US Relations after the SWIFT Agreement (2012) 17(2/1) European Foreign Affairs Review 71.

    47 Agreement between the United States of America and the European Union on the Use and Transfer of Passenger Name Records to the United States Department of Homeland Security [2012] OJ L 215/5; Agreement between the European Union and Australia on the Processing and Transfer of Passenger Name Record (PNR) Data by Air Carriers to the Australian Customs and Border Protection Service [2012] OJ L 186/4.

    48 See European Commission, above n 44.

  • 756 UNSW Law Journal Volume 37(2)

    countries,49 also show the intention of the EU to cooperate on information sharing internationally.50

    2 Data Protection and Counter-Terrorism

    The centrepiece of EU regulation in the field of data protection is Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (Directive 95/46/EC).51 Like all directives, it is addressed to the member states and required transposition into national law through the enactment of data protection legislation in each member state. Even though the directive established minimum standards of data protection in all EU member states,52 its scope of application has expressly been limited to exclude data protection in the context of public and state security, defence, as well as criminal law. Post 2001, member states relatively quickly agreed on the necessity of EU-wide counter-terrorism measures but the negotiations for a more general EU data protection framework in the field of police cooperation were a relatively lengthy process. However, in 2008, the EU adopted Council Framework Decision 2008/977/JHA of 27 November 2009 on the Protection of Personal Data Processed in the Framework of Police and Judicial Cooperation in Criminal Matters,53 which is still in force.

    This Framework Decision requires member states to protect the fundamental rights and freedoms of natural persons when their personal data are processed for the purpose of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties.54 In article 13, the Framework Decision imposes conditions on the data transfer by national authorities to third states and international bodies. These conditions include that the transfer must be necessary for criminal law enforcement; must only be to competent authorities; and that the recipient state or international body ensures an adequate standard of data protection. However, the exclusion of some of the most important forms of cooperation, like the Schengen Information System, Europol or the Prm Convention, 55 has significantly limited the protections provided by the Framework Decision.56 In relation to exchange of information for

    49 See Europol, External Cooperation (2014) . 50 The EU, however, also took over international security strategies of the US, see Javier Argomaniz, When

    the EU Is the Norm-Taker: The Passenger Name Records Agreement and the EUs Internalisation of US Border Security Norms (2009) 31 Journal of European Integration 119.

    51 [1995] OJ L 281/31. 52 See Christopher Kuner, European Data Protection Law: Corporate Compliance and Regulation (Oxford

    University Press, 2nd ed, 2007). 53 [2008] OJ L 350/60 (Framework Decision). 54 Framework Decision [2008] OJ L 350/60, art 1(2). 55 See Prm Convention; see also the implementation of the Prm Convention into the EU legal framework

    by Council Decision (2008/615/JHA) [2008] OJ L 210/1. 56 Framework Decision [2008] OJ L 350/60, recital 39.

  • 2014 Thematic: The Challenge to Privacy 757

    counter-terrorism, the scope of the Framework Decision is further reduced by its article 1(4), which provides that the Framework Decision is without prejudice to essential national security interests and specific intelligence activities in the field of national security. Moreover, some rights are subject to exceptions, which can make it difficult for individuals to obtain effective legal protection. For example, while article 17 guarantees the right of the individual to access processed personal data, this right can be restricted in national legislation and the reasons for restriction are formulated in very broad terms.57

    The Lisbon Treaty,58 which entered into force in 2009, completely changed the institutional arrangements for police and judicial cooperation as well as for data protection in the EU. Because of the integration of the so-called third pillar (ie police and judicial cooperation in criminal matters), matters of police cooperation, including Europol, are now dealt with in articles 879 of the Treaty on the Functioning of the European Union (TFEU).59 This means that relevant measures, including instruments concerning the collection, storage, processing, analysis and exchange of relevant information60 now fall under the ordinary legislative procedure. This simplifies the process for the adoption of new counter-terrorism measures and strengthens the role of the European Parliament. As a further important change, the Charter of Fundamental Rights (CFR) has become binding EU constitutional law. Article 8 of the CFR includes a right to the protection of personal data.61 This right is complemented by the provision of article 16 of the TFEU, which confirms this right and guarantees the competence of the Union to regulate data protection for the whole Union including its member states.

    57 See Framework Decision [2008] OJ L 350/60, art 17(2), which allows restrictions which are a

    necessary and proportional measure: (a) to avoid obstructing official or legal inquiries, investigations or procedures; (b) to avoid prejudicing the prevention, detection, investigation and prosecution of criminal offences or for the execution of criminal penalties; (c) to protect public security; (d) to protect national security; (e) to protect the data subject or the rights and freedoms of others.

    58 Treaty of Lisbon Amending the Treaty on European Union and the Treaty Establishing the European Community, signed 13 December 2007, [2007] OJ C 306/1 (entered into force 1 December 2009) (Lisbon Treaty).

    59 The TFEU also widened the mandate of Europol: Consolidated Version of the Treaty on the Functioning of the European Union [2010] OJ C 83/47, art 88(1).

    60 TFEU [2010] OJ C 83/47, art 88(2)(a). 61 Charter of Fundamental Rights of the European Union [2000] OJ C 364/01, art 8 (CFR):

    Protection of personal data 1. Everyone has the right to the protection of personal data concerning him or her. 2. Such data must be processed fairly for specified purposes and on the basis of the consent of the

    person concerned or some other legitimate basis laid down by law. Everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified.

    3. Compliance with these rules shall be subject to control by an independent authority.

  • 758 UNSW Law Journal Volume 37(2)

    This new European constitutional situation with regard to data protection after the Lisbon Treaty has provided the basis for developing a new data protection framework. In January 2012, the EU Commission presented proposals 62 for a regulation setting out a general EU framework for data protection (to replace Directive 95/46/EC)63 and for a directive on the protection of personal data processed for the purposes of criminal law enforcement (to replace Framework Decision 2008/977/JHA).64 After an extensive review by the Civil Liberties, Justice and Home Affairs Committee of the European Parliament (LIBE Committee), with the general aim of achieving more clarity and a more appropriate balance between the conflicting human rights positions,65 a modified proposal is currently awaiting further parliamentary action.

    The Draft Directive66 is concerned with the protection of personal data processed for the purposes of the prevention, detection, investigation and prosecution of criminal offences. 67 This also includes offences related to terrorism. However, the Draft Directive is not intended to apply to the processing of personal data in the course of an activity which falls outside the scope of Union law, in particular concerning national security,68 or to data processed by the Union institutions, bodies, offices and agencies, such as Europol or Eurojust. 69 The Draft Directive therefore still suffers from some of the deficiencies of the framework decision it would replace, but it would nonetheless be a major step towards fostering a European approach to data protection with regard to counter-terrorism activities.

    62 Summarised by Viviane Reding, The European Data Protection Framework for the Twenty-First

    Century (2012) 2 International Data Privacy Law 119. 63 Proposal for a Regulation of the European Parliament and of the Council on the Protection of

    Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation) [2012] COM(2012) 11. In contrast to a directive, a regulation is directly applicable in the member states, without the need for national transposition: TFEU [2010] OJ C 83/47, art 288.

    64 Proposal for a Directive of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data by Competent Authorities for the Purposes of Prevention, Investigation, Detection or Prosecution of Criminal Offences or the Execution of Criminal Penalties, and the Free Movement of Such Data [2012] COM(2012) 10 (Draft Directive).

    65 Eg, the LIBE Committee introduced new provisions with regard to further processing for incompatible purposes (article 7a), the processing of genetic data (article 8a), general principles for data subject rights (article 10a), a data protection impact assessment (article 25a), joint operations (article 48a), and transmission of personal data to other authorities or private parties in the Union (article 55a): Committee on Civil Liberties, Justice and Home Affairs, European Parliament, Report on the Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation), A7-0402/2013.

    66 For a comparison between the Framework Decision [2008] OJ L 350/60 and the Draft Directive [2012] COM(2012) 10, see Reding, above n 62, 1223.

    67 Draft Directive [2012] COM(2012) 10, art 1(1). 68 Draft Directive [2012] COM(2012) 10, art 2(3)(a). Matters relating to national security and intelligence

    agencies are not included in the competences of the European Union. 69 Draft Directive [2012] COM(2012) 10, art 2(2)(b), recital 15.

  • 2014 Thematic: The Challenge to Privacy 759

    Any reform of the EU data protection framework now also needs to have regard to the statements contained in the decision of the CJEU on the Data Retention Directive. In this important decision, the Court held that the Data Retention Directive was invalid because it constituted a disproportionate interference with the right to respect for private life and with the right to the protection of personal data, as enshrined in articles 7 and 8 of the CFR respectively.70 The Court held that the EU legislator had failed to establish clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards against abuse and unlawful access of the data retained.71 The Data Retention Directive was held to apply too broadly because it did not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy.72 The Data Retention Directive further failed to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences.73 Many of the deficiencies of the Data Retention Directive, including the vague definition of the purpose and limits of data retention, can be attributed to competence issues. At the time of its enactment in 2006, a framework decision concerning police and judicial cooperation in criminal matters would have required unanimity of Council. When this was unattainable, the Data Retention Directive was based on the harmonisation competence of the internal market, which allowed its enactment with a qualified majority but did not enable it to address issues of police and judicial cooperation in criminal matters.

    While the decision of the CJEU does not preclude the enactment of a new directive on data retention, now based on the broader competence of the Lisbon Treaty, such an initiative is currently unlikely. In any event, it would need to carefully consider the Courts statements relating to the definition of the purpose and limits of data retention, as well as of the substantive and procedural safeguards that would apply to access and subsequent use of the data by competent national authorities. In the meantime, each member state is called upon to determine the scope and limits of data retention in its national laws, having regard to its specific constitutional framework.74

    The preceding discussion of the EU instruments in the field of data protection demonstrates the significance of the multiple constitutional protections existing in this area specifically, the right to the protection of personal data in article 8

    70 Digital Rights Ireland Ltd v Minister for Communications, Marine and Natural Resources; Krntner

    Landesregierung v Seitlinger (European Court of Justice, C-293/12; C-59/14, 8 April 2014) [69]. 71 Ibid [54]. 72 Ibid [58]. 73 Ibid [60]. 74 Most recently the Austrian Constitutional Court declared the Austrian statutory provisions on data

    retention to be an excessive interference with the right to data protection and declared them to be void and unconstitutional: Verfassungsgerichtshof [Austrian Constitutional Court], G 47/2012, 27 June 2014.

  • 760 UNSW Law Journal Volume 37(2)

    of the CFR and, more generally, the right to respect for ones private life in article 7 of the CFR and article 8 of the ECHR. 75 The strength of these constitutional protections has been confirmed in the CJEUs judgment on the Data Retention Directive. The proposed new data protection framework of the EU is expected to build upon these foundations and to create an effective approach towards the collection, storage and use of personal data by police and criminal authorities. However, the activities of intelligence agencies and their use of personal data will remain within the domestic sphere of the member states and, thus, be outside the purview of the EUs data protection regime.

    3 International Dimension

    The new EU data protection framework for police and judicial cooperation also provides general principles for the international transfer of personal data (article 33 of the Draft Directive). Personal data can be transferred to third countries or international organisations if this is necessary for criminal law enforcement and provided that there is either an adequacy decision of the European Commission (article 34 of the Draft Directive) or that appropriate safeguards (article 35 of the Draft Directive) are in place. In addition to these formal avenues, article 36 of the Draft Directive allows derogations from articles 34 and 35 to transfer personal data to a third country in exceptional circumstances, for example, if the transfer of the data is essential for the prevention of an immediate and serious threat to public security of a Member State or a third country,76 which may cover cases of a specific terror threat. The transfer is also possible if, more broadly, it is necessary in individual cases for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties.77 The European Parliament adopted amendments to the Draft Directive proposed by the LIBE Committee, which provided further safeguards including a prohibition on the frequent massive transfer of data and strict limitations on transfers on the basis of derogations. 78 The overall concept of derogation possibilities, however, has remained the same.

    75 CFR [2000] OJ C 364/01, art 52(3): In so far as this Charter contains rights which correspond to rights

    guaranteed by the Convention for the Protection of Human Rights and Fundamental Freedoms, the meaning and scope of those rights shall be the same as those laid down by the said Convention. This provision shall not prevent Union law providing more extensive protection.

    76 See Draft Directive [2012] COM(2012) 10, art 36(2)(c). 77 See Draft Directive [2012] COM(2012) 10, art 36(2)(d). 78 See European Parliament, Legislative Resolution of 12 March 2014 on the Draft Directive, A7-

    0403/2013, Amendment 99, art 36: 2b. All transfers of data decided on the basis of derogations shall be duly justified and shall be limited to what is strictly necessary, and frequent massive transfers of data shall not be allowed. 2c. The decision for transfers under paragraph 2 [refers to the possibility of derogation] must be made by duly authorised staff. These transfers must be documented and the documentation must be made available to the supervisory authority on request, including the date and time of the transfer, information about the recipient authority, the justification for the transfer and the data transferred.

  • 2014 Thematic: The Challenge to Privacy 761

    Notably, the EU also puts data protection policy on its foreign affairs agenda.79 Article 38 of the Draft Directive tasks the Commission and the member states with improving international cooperation regarding the protection of personal data. The Union aims to develop effective international cooperation mechanisms to facilitate the enforcement of legislation for the protection of personal data, international mutual assistance in the enforcement of legislation for the protection of personal data and to promote the exchange and documentation of personal data protection legislation and practice.80 Thus, the EUs data protection regime with regard to police and judicial cooperation does not only affect third countries who wish to cooperate with the EU but the Union seeks to export its own visions and concepts of data protection into the world.

    4 Conclusion

    The scourge of international terrorism provided the impetus for counter-terrorism measures at the European level, including initiatives like EUs Data Retention Directive, which sought to create a legal framework for storing internet and (tele)communication traffic data for law enforcement and national security purposes. The European counter-terrorism measures are not limited to EU citizens or EU territories but affect international communication with links to the territory of the Union. Moreover, these measures are not restricted to counter-terrorism but member states are free to allow their use for other law enforcement purposes, especially regarding serious crime.

    Alongside the Europeanisation of information technology-based counter-terrorism measures have been attempts to foster data protection in the Union. The recent CJEUs decision on the invalidity of the Data Retention Directive underlines the value attached to privacy in the EU legal order. The new Draft Directive on data protection concerning police and judicial cooperation would definitely be a major achievement, but nevertheless has significant loopholes. It is only directed at member states and thus does not apply to Europol. Broad provisions allowing international cooperation to take place on the basis of derogation clauses mean that the Draft Directives requirements for adequacy or appropriate safeguards can be sidestepped. Lastly, and most importantly, national security and the activities of intelligence agencies are not included in the EU framework. The current and future European frameworks therefore still leave much room for national counter-terrorism activities, including mass surveillance, that do not need to abide by the EU data protection regime.

    79 On the EU strategies to extend the scope of application of the EUs Data Protection Directive, see Lokke

    Moerel, The Long Arm of EU Data Protection Law: Does the Data Protection Directive Apply to Processing of Personal Data of EU Citizens by Websites Worldwide? (2011) 1 International Data Privacy Law 28.

    80 See Draft Directive [2012] COM(2012) 10, art 38(1).

  • 762 UNSW Law Journal Volume 37(2)

    B The United States 1 Counter-Terrorism Surveillance Measures

    The US response to 9/11 dramatically altered many aspects of US law, both domestically and regarding its international legal relations. This includes most prominently the treatment of terror suspects in Guantnamo and elsewhere with all its implications (enemy combatants, military trials, black sites),81 but also the USA PATRIOT Act82 (Patriot Act) and the massive surveillance of domestic and internationals by the National Security Agency (NSA).83 The analysis of more than 10 years of US surveillance shows that the legal response to terrorism has the following characteristics: measures have been based on the exercise of legislative as well as executive powers; there is a sharp cleavage between the constitutional protections afforded to US citizens and the significantly lesser protections enjoyed by foreigners;84 and there has been reliance on a variety of extra-legalistic concepts to avoid legal obligations that would otherwise apply.85

    The most prominent reaction to 9/11 with regard to surveillance was the Patriot Act. As Banks has noted, the

    Patriot Act is hardly a code for fighting the war on terrorism, nor one for saving the US homeland from another attack. Instead, it is an amalgam of often unrelated pieces of authority, most of which simply amend existing laws, and the larger share of which are unremarkable complements to existing authority.86

    The Patriot Act provided the Federal Bureau of Investigation (FBI) with greater powers in the conduct of national security investigations. Independently of courts, the FBI can issue National Security Letters to obtain simplified access to various information sources, such as the internet, libraries, bank accounts, car dealers, post offices, casinos.87 The Patriot Act also provides the basis for the bulk collection by the NSA of telephone call records or metadata. This program, which records the calling and receiving phone number, as well as time and date of most US phone calls but not their contents, has been periodically approved by a special secret court, the Foreign Intelligence Surveillance Court (FISC) pursuant to section 215 of the Patriot Act.88

    81 William C Banks, The United States a Decade after 9/11 in Victor V Ramraj et al (eds), Global Anti-

    terrorism Law and Policy (Cambridge University Press, 2nd ed, 2012) 449, 45360; Roach, above n 1. 82 The title of this 2001 Act (Pub L No 107-56, 115 Stat 272) is a backronym that stands for Uniting and

    Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism. 83 Roach, above n 1, 1846. 84 Milanovic, above n 14. 85 Roach, above n 1, 163. 86 Banks, The United States a Decade after 9/11, above n 81, 470. 87 Andrew E Nieland, National Security Letters and the Amended Patriot Act (2007) 92 Cornell Law

    Review 1201. 88 This program has come under sharp criticism by the Privacy and Civil Liberties Oversight Board,

    an independent agency appointed by the US President and approved by Congress, which calls for its abolition: David Medine et al, Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court (Report, Privacy and Civil Liberties Oversight Board, 23 January 2014).

  • 2014 Thematic: The Challenge to Privacy 763

    Under another program, the US government collects in the so-called PRISM database, the content of electronic communications, including phone calls and emails, where the targets are reasonably believed to be non-US persons located outside the US. Amendments of the Foreign Intelligence Surveillance Act (FISA) opened up the possibility of undertaking such electronic surveillance by authorisation of the Director of National Intelligence.89 This surveillance program, which had been established on administrative authorisation, was legitimised by section 702 of the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008.90 FISA procedures bypassed traditional approaches towards criminal investigations (warrant process) and fostered increased cooperation between intelligence agencies and law enforcement.91

    The Patriot Act and FISA are the most relevant federal Acts but different levels of administration, including the US President, the US government, law enforcement and intelligence agencies have introduced numerous further surveillance programs.92 The US model of surveillance has therefore been described as an executive model of counter-terrorism.93 The government enabled various counter-terrorism surveillance programs without congressional approval, with legislation also often strengthening the surveillance powers of the administration. Temporary measures have often become permanent and the complexity of the rules has been steadily increasing. The strengthening of administrative powers goes along with closer cooperation between intelligence agencies and law enforcement agencies and the weakening of judicial controls. More recently, Congress has begun to engage in more intense scrutiny of the intelligence services and their surveillance programs. The USA Freedom Act,94 which has passed the House of Representatives and is currently before the Senate, seeks to restrict the surveillance activities under FISA, in particular the bulk collection of telephony metadata, and imposes further requirements on police authorities regarding the use of personal data, but also extends the Patriot Act until 2017.

    Many forms of surveillance target international communication inside and outside US territory. The US has concluded various international agreements regarding surveillance. The UKUSA Agreement, a treaty between Australia, Canada, New Zealand, the UK and the US for joint cooperation in signals

    89 50 USC 180185. 90 Pub L No 110-261, 122 Stat 2436. 91 David Cole, English Lessons: A Comparative Analysis of UK and US Responses to Terrorism (2009)

    62 Current Legal Problems 136. 92 William C Banks, The Death of FISA (2007) 91 Minnesota Law Review 1209, 12756; Stephanie K

    Pell, Systematic Government Access to Private-Sector Data in the United States (2012) 2 International Data Privacy Law 245, 24954; Cate, above n 10, 44451.

    93 Daphne Barak-Erez, Terrorism Law between the Executive and Legislative Models (2009) 57 American Journal of Comparative Law 877.

    94 Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-Collection and Online Monitoring Act, HR Res 3361, 113th Congress (2014) (USA Freedom Act).

  • 764 UNSW Law Journal Volume 37(2)

    intelligence (also known as Five Eyes), or the TFTP Agreement95 are prominent examples. The possibilities of the US regarding international surveillance are enormous and, as the Snowden revelations have confirmed, the potential is used extensively. As US companies play a crucial role in internet communication, surveillance inside the US territory opens up manifold possibilities regarding international communication networks. While US surveillance has broad international reach, 96 the level of protection afforded to foreigners against excessive or unwarranted surveillance is very low. Under the US constitutional system, civil liberties are generally assumed to depend on citizenship, providing foreigners with very limited protection.97 This also applies to the protection of privacy under the Fourth Amendment.98 The constitutional assessment of anti-terrorism measures therefore draws a sharp distinction between surveillance involving US persons and surveillance on non-US persons. 99 However, in practice, the US counter-terrorism programs initiated by the administration have often not been able to uphold this distinction. Much surveillance is sweeping and affects all kinds of personal information, frequently affecting foreigners as well as US persons alike.

    The political debate on the US surveillance program in the US is likely to remain focused on US interests. Foreigners not permanently residing in the US can only expect a reprieve from continued US intrusion if the surveillance, by chance or by necessity, also affects the legal rights of US citizens or residents, or if the international diplomatic process brings home to the US administration that a particular form of surveillance does more harm than good to US interests. However, the recent scandals involving US interception of telecommunications by foreign heads of state including German Chancellor Angela Merkel100 and the US administrations response to them, demonstrate that even powerful allies encounter difficulties in seeking assurances that they be exempt from surveillance.

    95 Terrorist Finance Tracking Program Agreement [2010] OJ L 195/5. 96 Gehan Gunasekara, The Final Privacy Frontier? Regulating Transborder Data Flows (2007) 17

    International Journal of Law and Information Technology 147, 1612. 97 On the constitutional right to habeas corpus of non-US nationals imprisoned in Guantanamo, see, eg,

    Boumediene v Bush, 553 US 723 (2008). 98 United States v Verdugo-Urquidez, 494 US 259 (1990). 99 This differentiation between US persons and non-US persons also underlies the constitutional analysis by

    the Privacy and Civil Liberties Oversight Board: see David Medine et al, Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act (Report, Privacy and Civil Liberties Oversight Board, 2 July 2014) .

    100 See, eg, Philip Sherwell, Barack Obama Approved Tapping Angela Merkels Phone 3 Years Ago, The Telegraph (online), 27 October 2013 .

  • 2014 Thematic: The Challenge to Privacy 765

    2 Privacy and Counter-Terrorism The US concept of privacy has a number of legal dimensions: first, the US

    Constitution provides some privacy guarantees, especially in the Fourth Amendment,101 which protects individuals against unreasonable searches and seizures. The case law of the US Supreme Court (Supreme Court) developed certain standards of constitutional protection of privacy, which are, however, very ambivalent. The courts have also developed a common law right to privacy, including a right to be left alone, allowing suits for damages and injunctions through a private cause of action. Private law protection of privacy is relatively weak because freedom of speech, the value with which privacy is often in conflict, enjoys a high degree of constitutional protection in the First Amendment.

    In federal data protection legislation, the Privacy Act 1974 (Privacy Act) is of particular note.102 It imposes standards that bind a federal agency in its collection, use, maintenance and disclosure of personally identifiable information. It creates statutory privacy rights for US citizens and legal permanent residents but does not cover visitors or aliens. Non-US persons can nonetheless benefit from the protections of the Privacy Act, when agencies, such as the US Department of Homeland Security, apply its provisions to data repositories that contain personal information of US persons and non-US persons.103 A further limitation of the Privacy Act is that it does not apply to records created or held by the intelligence agencies. As a result many new surveillance possibilities established for anti-terrorism purposes stand outside or displace the Privacy Act.104

    The most relevant restriction on surveillance is the Fourth Amendment to the US Constitution. In the landmark decision of Katz v United States,105 the Supreme Court provided some protection for individual privacy against state surveillance, but the judgment did not lead to the development of broadly-based privacy jurisprudence.106 The Supreme Court held that the government intrudes upon a persons reasonable expectation of privacy, and violates an individuals rights under the Fourth Amendment, if it overhears that persons private conversations by means of a listening device attached to the outside of a public phone booth. Yet, subsequent case law demonstrates that the protection under the Fourth Amendment is incomplete in an important respect: any personal information, 101 Stephen J Schulhofer, More Essential Than Ever: The Fourth Amendment in the Twenty-First Century

    (Oxford University Press, 2012) 14468. 102 5 USC 552a. See Andrew Charlesworth, Clash of the Data Titans? US and EU Data Privacy

    Regulation (2000) 6 European Public Law 253, 25960. 103 Hugo Teufel III, Privacy Policy Guidance Memorandum (Memorandum No 2007-1, US Department of

    Homeland Security, 7 January 2009) .

    104 If a specific Act on the use of personal data authorises this use (like FISA), the Privacy Act does not apply.

    105 Katz v United States, 389 US 347 (1967) (Katz). 106 See Thomas N McInnis, The Evolution of the Fourth Amendment (Lexington Books, 2009) 2229.

  • 766 UNSW Law Journal Volume 37(2)

    which a person voluntarily communicates to a third party, such as to a bank (in United States v Miller)107 or a telephone company (in Smith v Maryland)108 no longer enjoys the protection of the Fourth Amendment.109 These dicta import a significant limitation to privacy. Once a person is communicating personal data to someone else (including private business or individuals) the protection of the Fourth Amendment no longer applies. This provided the basis for section 215 of FISA, introduced through the Patriot Act, that empowers the FISC to issues orders on third parties to turn over information records that may assist investigations against international terrorism or clandestine intelligence activities.

    While these various strands of constitutional, statute and case law create a patchwork of privacy protection, they constantly need to be adapted in light of technological developments that create new threats to privacy. In United States v Jones,110 the Supreme Court recently decided on the reach of Fourth Amendment in the context of new tracking technologies. Jones was a suspected drug dealer and the police decided to attach a Global Positioning System (GPS) tracking tool to his car, while it was parked in a public place. The Supreme Court found that this police conduct constituted an unconstitutional search of the car, and was in violation of the Fourth Amendment. Instead of using the Katz test, the decision was based on a property-based conception of Fourth Amendment rights and held that the police had committed a trespass on the car. In their opinions, the Justices also put into doubt the principle that an individual has no reasonable expectation of privacy in information voluntarily disclosed to a third party.111 But, for now, the extent to which this newer jurisprudence affects the longstanding decisions in Miller and Smith remains unclear.

    In the very recent case of Riley v California,112 the US Supreme Court recognised the significance of mobile phones as repositories of personal information and held that the Fourth Amendment prohibited the search of a cellphone without a warrant. Together with Jones, this decision shows the US Supreme Courts willingness to keep the privacy protections provided for in the US Constitution relevant to the contemporary technological context.

    3 Conclusion

    The US has dramatically extended its national and international surveillance activities since 9/11. The US administrative and extra-legal approach made it

    107 United States v Miller, 425 US 435 (1976) (Miller). 108 Smith v Maryland, 442 US 735 (1979). 109 McInnis, above n 106, 2328. 110 United States v Jones, 132 S Ct 945 (2012) (Jones). 111 See especially ibid 957 (Sotomayor J), 9623 (Alito J). See also Federico Fabbrini and Mathias

    Vermeulen, GPS Surveillance and Human Rights Review: The European Court of Human Rights and the United States Supreme Court in Comparative Perspective in Fergal Davis, Nicola McGarrity and George Williams (eds), Surveillance, Counter-Terrorism and Comparative Constitutionalism (Routledge, 2014) 134, 13948.

    112 Riley v California, 134 S Ct 2473 (2014).

  • 2014 Thematic: The Challenge to Privacy 767

    possible to sidestep some of the constitutional restrictions that traditionally limited surveillance. The national and international criticism following the Snowden revelations of the largely unbridled development of US surveillance activities may now prompt a re-evaluation of some aspects of these activities. In January 2014, President Obama delivered a major speech calling for reforms to government surveillance programs, including those conducted by the NSA, to strengthen protections for privacy and civil liberties, improving transparency and oversight, and to rebuild trust among foreign leaders and citizens.113 The US Congress has begun to exercise closer scrutiny and to implement law reform proposals that would improve privacy protections, including restraints on extra-legal surveillance as a counter-terrorism measure.114

    Surveillance activities appear to be less extensive in relation to US citizens but some counter-terrorism measures are unable to differentiate according to citizenship or residence. In such cases, the Supreme Court may be called upon by US persons to develop the guarantees of the Fourth Amendment further.115 Despite some newer developments, the protection of privacy regarding counter-terrorism activities faces many restrictions. Regarding the monitoring of US citizens, it will be the task of the Supreme Court to adapt the existing restraints, in particular the Fourth Amendment, to provide redress against new threats of undue government interference.

    International surveillance by US agencies falls altogether outside US privacy protection. First of all, neither the US Constitution nor the US Privacy Act protects foreigners living abroad. International agreements between the US and the EU with regard to Passenger Name Records (PNR), which have established a particular regime of data protection, and a proposed data protection agreement relating to personal data shared with the US by EU countries for law enforcement purposes remain the exception. In the course of negotiations relating to this agreement, the US administration recently declared the intention to extend the protection guaranteed by the US Privacy Act to EU citizens.116 Such an extension, however, would not affect the large-scale surveillance and collection activities by US intelligence agencies which will remain virtually beyond challenge by non-US citizens.

    113 Barack Obama, Remarks by the President on Review of Signals Intelligence (Speech delivered at the

    Department of Justice, Washington DC, 17 January 2014) . See also Richard A Clarke et al, Liberty and Security in a Changing World: Report and Recommendations of the Presidents Review Group on Intelligence and Communications Technologies (Final Report, Review Group on Intelligence and Communication Technologies, 12 December 2013) .

    114 See, eg, the current USA Freedom Act initiative before Congress. 115 Cole, above n 19, 95116. 116 See Ewen MacAskill, US to Extend Privacy Protection Rights to EU Citizens, The Guardian (online),

    25 June 2014 .

  • 768 UNSW Law Journal Volume 37(2)

    C Australia 1 Counter-Terrorism Surveillance Measures

    While Australia has not suffered devastating terrorist attacks in its own territory,117 the Australian Parliament established a wide spectrum of far-reaching counter-terrorism measures after 9/11. Politically inspired by counter-terrorism legislation in the US and the UK, Australias hyper-legislation118 has created new anti-terrorism offences and provided the Australian Security Intelligence Organisation (ASIO) and other agencies with myriad new powers.119 These developments need to be assessed in the context of Australias system for protection of human rights, which now stands unique among Western democracies. The absence of a constitutional Bill of Rights at the federal level means that the High Court has few powers to invalidate excessive anti-terrorism laws. Instead, it is the Australian Parliament that has primary responsibility for balancing and upholding human rights. Under Australias bicameral parliamentary system, the chances of effective scrutiny of legislation often depend on the Senate, representing the Australian states and territories, with such scrutiny being more likely when the Senate is not controlled by the party forming the Commonwealth government. However, much of Australias anti-terrorism legislation has been bipartisan and rushed through Parliament in a climate of fear and urgency,120 as a result of which Senate amendments of Bills are often focused on specific issues rather than the overall trend and effect of the legislation.

    The academic debate on counter-terrorism measures seems to have focused on the new offences and the expansion of coercive powers, such as questioning and detention powers, given to ASIO and other law enforcement agencies.121 The extent to which the surveillance powers and capabilities have been enhanced has received much less attention.122 This is despite the fact that the Telecommunications (Interception and Access) Act 1979 (Cth) (TIA) has been amended numerous times since 2001. The TIA regulates the circumstances in which communications both communications passing over a telecommunications network as well as stored communications can be accessed by law enforcement agencies.123 In his detailed analysis A Decade of Australian

    117 The Bali Bombings of 12 October 2002 were, however, a major turning point in Australias efforts to

    foster regional cooperation on counter-terrorism. 118 This term is used as the title of the chapter on Australia in Roach, above n 1, 30960. 119 See Nicola McGarrity and George Williams, From Covert to Coercive: A New Model of Surveillance by

    Intelligence Agencies in Fergal Davis, Nicola McGarrity and George Williams (eds), Surveillance, Counter-Terrorism and Comparative Constitutionalism (Routledge, 2014) 234.

    120 See Nicola McGarrity and George Williams, Counter-Terrorism Laws in a Nation without a Bill of Rights: The Australian Experience (2010) 2 City University of Hong Kong Law Review 45.

    121 See Roach, above n 1. 122 But see Niloufer Selvadurai, Peter Gillies and Rizwanul Islam, Maintaining an Effective Legislative

    Framework for Telecommunication Interception in Australia (2009) 33 Criminal Law Journal 34; Simon Bronitt and James Stellios, Telecommunications Interception in Australia: Recent Trends and Regulatory Prospects (2005) 29 Telecommunications Policy 875.

    123 A communication is a conversation or a message in whatever form, including speech or data: TIA s 5.

  • 2014 Thematic: The Challenge to Privacy 769

    Anti-terror Laws, George Williams dedicates only one paragraph to surveillance measures:

    Section 5D of the Telecommunications (Interception and Access) Act 1979 (Cth) includes divs 72, 101, 102 and 103 of the Criminal Code within the definition of a serious offence. This means that telecommunications warrants may be issued to assist with the investigation of terrorism offences. Warrants may also be issued in relation to non-suspects who are likely to communicate with the person under investigation (known as B-Party communication). Communications may be intercepted through intrusive methods such as optical surveillance and tracking devices.124

    The TIA also provides a statutory basis for warrantless access to telecommunications data. Under Part IV, telecommunications providers are obliged to hand over communications metadata (not the content of the communications) to numerous Commonwealth and state government departments and agencies if the information is reasonably necessary for a law enforcement purpose and the disclosure is approved by an authorised senior officer of the relevant agency. In the year 201213, 319 874 authorisations for access to existing information or documents were made in the enforcement of a criminal law alone.125 As a result of the Telecommunications Interception and Intelligence Services Legislation Amendment Act 2010 (Cth) (TIISLA), the communication and sharing of intelligence between intelligence and law enforcement agencies has been further enhanced.126 Greg Carne summarises the consequences of TIISLA as follows:

    [T]he changes provide security and intelligence agencies with a significantly enhanced influence or contribution, through communication, cooperation and assistance, into Commonwealth and State administration. Largely by a legislative process of ignorance, default, omission and elision, the Telecommunications Interception and Intelligence Services Legislation Amendment Act 2011 (Cth) signals a strong move towards a more authoritative state, with the infusion and integration of national security information, cooperation and assistance as increasingly influential in the ordinary business and functions of both Commonwealth and State government.127

    In a 2012 discussion paper, the Attorney-Generals Department acknowledged that the telecommunications interception regime is outdated and in need of holistic reform.128 The Attorney-General Departments proposals were

    124 See George Williams, A Decade of Australian Anti-terror Laws (2011) 35 Melbourne University Law

    Review 1136, 11501; see also David Hume and George Williams, Whos Listening? Intercepting the Telephone Calls, Emails and SMSs of Innocent People (2006) 31 Alternative Law Journal 211; see also Surveillance Devices Act 2004 (Cth) s 6.

    125 Attorney-Generals Department, Telecommunications (Interception and Access) Act 1979: Annual Report 201213 (Report, 2013) 49.

    126 Greg Carne, Beyond Terrorism: Enlarging the National Security Footprint through the Telecommunication Interception and Intelligence Services Legislation Amendment Act 2011 (Cth) (2011) 13 Flinders Law Journal 177.

    127 Ibid 239. 128 Attorney-Generals Department, Equipping Australia against Emerging and Evolving Threats

    (Discussion Paper, July 2012) 17.

  • 770 UNSW Law Journal Volume 37(2)

    said to aim at strengthening the safeguards and privacy protections; reforming the lawful access regime for agencies; reducing complexity and modernising the cost-sharing framework.129 In June 2013, the Parliamentary Joint Committee on Intelligence and Security tabled a report that assessed potential reform options in the context of a wider inquiry into the legislative national security framework, including the TIA, the Telecommunications Act 1997 (Cth), the Australian Security Intelligence Organisation Act 1979 (Cth) and the Intelligence Services Act 2001 (Cth).130 As far as the TIA was concerned, the report recommended the introduction of an objects clause which would express the Acts dual objectives of protecting the privacy of communications and of enabling interception and access to communications in order to investigate serious crime and threats to national security. 131 In addition to mandatory record keeping standards and improved oversight arrangements, the report also recommended that the Attorney-Generals Department examine the introduction of a proportionality test into the legislation that would provide a mechanism for balancing the privacy interest affected, the public interest in the investigative activity and the availability of less invasive investigative measures.132

    In December 2013, the Senate referred an inquiry into a comprehensive revision of the TIA, including the recommendations of the 2013 Report of the Parliamentary Joint Committee on Intelligence and Security, to its Legal and Constitutional Affairs References Committee. 133 While this inquiry is still underway,134 the government has introduced a Bill to implement the (bipartisan) recommendations of the Parliamentary Joint Committee on Intelligence and Security to expand the surveillance capabilities of the Australian spy agencies.135 Under these proposed amendments, ASIO will be given wide-ranging new powers to use computers of innocent third parties to gain access to a computer used by a suspected terrorist or criminal. Through a redefinition of the term computer, 136 ASIO will also be empowered to access multiple computers operating in a network on a single warrant, rather than requiring separate warrants for individual computers as at present widening its capabilities to target information stored in the cloud or to intercept information flows between computers. In implementing these proposals, the government is heeding the calls

    129 Attorney-Generals Department, Submission No 218 to Parliamentary Joint Committee on Intelligence

    and Security, Inquiry into Potential Reforms of National Security Legislation, 23. 130 Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Report of the

    Inquiry into Potential Reforms of Australia's National Security Legislation (2013). 131 Ibid recommendation 1. 132 Ibid recommendation 2. 133 Senate Legal and Constitutional Affairs References Committee, Parliament of Australia, Comprehensive

    Revision of the Telecommunications (Interception and Access) Act 1979 (2014) .

    134 The Committee is due to report in August 2014. 135 See National Security Legislation Amendment Bill (No 1) 2014 (Cth). 136 National Security Legislation Amendment Bill (No 1) 2014 (Cth) cl 3, sch 2 pt 1 item 4.

  • 2014 Thematic: The Challenge to Privacy 771

    of the Australian Intelligence Community137 that increased powers are needed to effectively combat the threat of terrorism, including from Australians who are suspected of engaging in overseas terrorist activities. In light of the bipartisan support for increasing the powers of the intelligence services, these changes are certain to pass Parliament, and Australians must accept the governments assurances that the exercise of these new powers will be subject to appropriate safeguards and accountability mechanisms.138 Yet, this further expansion of surveillance powers will add to the sense of public unease about the reach of the Australian intelligence agencies into the lives of ordinary Australian citizens.139

    2 Privacy and Counter-Terrorism

    Australian data protection laws are mainly contained in the Privacy Act 1988 (Cth) (Privacy Act), which responds, as stated in its preamble, both to Australias obligations to protect privacy under the International Covenant on Civil and Political Rights as well as to the OECD Guidelines on Privacy. The Privacy Act applies to federal agencies as well as private sector organisations. In the Privacy Act, the term agency includes the Australian Federal Police (section 6(1)) and other Commonwealth bodies. However, section 7(1) provides that an act or practice in relation to a record that has originated with, or has been received from an intelligence agency140 is not subject to the Privacy Act. Furthermore, section 7(1A) specifies that the disclosure of personal information by another entity to the Australian Security Intelligence Organisation, the Australian Secret Intelligence Service or the Australian Signals Directorate is not an act or practice which falls under the Privacy Act. Disclosure and other data processing in the context of national security is therefore intended to be exempt from the general protections of privacy. Counter-terrorism measures are only relevant within the privacy framework if they are part of law enforcement.

    137 The Australian Intelligence Community is an informal term to describe the six Australian security and

    intelligence agencies: Inspector General of Intelligence and Security, The Australian Intelligence Community, .

    138 Parliamentary Joint Committee on Intelligence and Security, above n 130, recommendation 22. Many of the safeguards in the current legislation only apply to Australian persons, ie Australian citizens and permanent residents, providing more far-ranging powers to act against non-Australians: see, eg, Intelligence Services Act 2001 (Cth) ss 8, 9, 15.

    139 As part of the extensive revelations in 2013 of secret surveillance activities by the US and its close allies, a secret document leaked by Edward Snowden suggested that the Australian Defence Signals Directorate (now the Australian Signals Directorate) offered to share private information on Australian citizens to its four intelligence-sharing partners: Ewen MacAskill, James Ball and Katharine Murphy, Revealed: Australian Spy Agency Offered to Share Data about Ordinary Citizens, The Guardian (online), 2 December 2013 .

    140 These are defined in s 6 of the Privacy Act 1988 (Cth) as (a) the Australian Security Intelligence Organisation; (b) the Australian Secret Intelligence Service; or (c) the Office of National Assessments.

  • 772 UNSW Law Journal Volume 37(2)

    The Privacy Act has recently been amended to reflect changes in modern information practices.141 Under the revised Act, APP entities, which includes the public sector agencies and private sector organisations to which the Privacy Act applies, must handle personal information in conformity with the Australian Privacy Principles (APPs). The APPs lay down standards relating to the collection, use, disclosure and storage of personal information. However, enforcement related activities of enforcement bodies are facilitated through a number of exceptions in the principles.142 This includes that enforcement bodies may collect sensitive information without the consent of the individual concerned (APP 3.4) and that an APP entity may use or disclose personal information for a purpose other than the purpose for which it was collected (secondary purpose) if it reasonably believes this to be necessary for enforcement related activities conducted by, or on behalf of, an enforcement body (APP 6.2(e)). APP 8, which imposes limitations on cross-border disclosure of personal information, also does not apply to an agency if the cross-border disclosure is required or authorised by or under an international agreement relating to information sharing to which Australia is a party (APP 8.2(e)). This would include, for example, the UKUSA Agreement. Another exception applies if an agency reasonably believes the disclosure to be necessary for enforcement related activities by an overseas body with similar functions or powers to an Australian enforcement body (APP 8.2(f)). This exception potentially applies to all kinds of information exchanges for the purposes of counter-terrorism between Commonwealth agencies and overseas law enforcement bodies. In these cases, Australian agencies are not bound to respect the APPs.

    3 Conclusion

    Australians lack a constitutional right to privacy and the data protection provisions of the Privacy Act 1988 (Cth) contain significant holes. The activities of the intelligence agencies are not subject to the Act and exceptions to the APPs give law enforcement agencies relatively free reign in designing their information handling practices as well as easier access to information held by other agencies.

    141 For a general overview of the reforms, see Normann Witzleb, Halfway or Half-Hearted? An Overview of

    the Privacy Amendment (Enhancing Privacy Protection) Act 2012 (Cth) (2013) 41 Australian Business Law Review 55.

    142 Enforcement related activities and enforcement bodies are terms defined in s 6 of the Privacy Act 1988 (Cth). Enforcement related activities include (a) the prevention, detection, investigation, prosecution or punishment of: (i) criminal offences; or (ii) breaches of a law imposing a penalty or sanction; or (b) the conduct of surveillance activities, intelligence gathering activities or monitoring activities. Enforcement bodies include the Australian Federal Police, state and territory police forces, CrimTrac (the national police information sharing body). The Australian Secret Intelligence Service are not specifically mentioned under s 6. However, they could be considered to be falling under (f) another agency, to the extent that it is responsible for administering, or performing a function under, a law that imposes a penalty or sanction or a prescribed law. This would be on the basis that they may co-operate with and [assist law enforcement bodies] in the performance of [their functions]: see, eg, Australian Security Intelligence Organisation Act 1979 (Cth) s 19(1).

  • 2014 Thematic: The Challenge to Privacy 773

    The powers provided under ASIO Act 1979 (Cth) and the TIA have been significantly extended since 2001 and are due for further expansion under legislative proposals recently introduced by the federal Government. Intelligence agencies and police authorities have increased their cooperation,143 blurring the distinction between intelligence-gathering and law enforcement.144 The recent reforms of the Privacy Act, including the introduction of revised Privacy Principles, have not substantially changed Australias surveillance situation. There is widespread recognition that the TIA, which provides the basis for access to and interception of telecommunications data, is outdated and provides insufficient protection of individual privacy. The proposed reforms will widen the surveillance capabilities of Australias security agencies and are intended to provide a more coherent set of safeguards and accountability mechanisms.

    The Australian public knows little about the extent to which counter-terrorism measures allow surveillance and cross-border information sharing by Australian government agencies. It is therefore unsurprising that there is growing unease about the extent to which Australian intelligence agencies and law enforcement authorities engage in surveillance of ordinary citizens. The recent Snowden revelations about vast secret surveillance programs in the US, and embarrassing revelations of Australia targeting the inner circle of the Indonesian government,145 suggest that improved technical capabilities need to be matched with more robust protocols on permitted usage. The absence of constitutional protections of the right to privacy and relatively weak data protection laws provide government with much discretion to expand the powers of agencies to encroach on the personal information of Australian citizens.

    III INTERNET SURVEILLANCE, PRIVACY AND INTERNATIONAL DATA PROTECTION

    A The New Dimension of Intrusion Surveillance measures for the purposes of counter-terrorism are reaching

    unprecedented intensity and intrude deeply into the personal sphere of millions of citizens. Because of the globalisation of telecommunications, every person can become a potential target of monitoring and information exchanges by almost any state of the world, often without personal knowledge. While citizens may enjoy some (constitutional) protections of their right to privacy against their own state, non-citizens may often find it impossible to resist these practices.

    143 See Telecommunications Interception and Intelligence Services Legislation Amendment Act 2011 (Cth). 144 Carne, above n 126, 18693. 145 Ewen MacAskill and Lenore Taylor, Australia's Spy Agencies Targeted Indonesian President's Mobile

    Phone, The Guardian (online), 18 November 2013 .

  • 774 UNSW Law Journal Volume 37(2)

    Besides its international dimension, internet surveillance often includes the following characteristics. First of all, surveillance powers are usually not restricted to terrorism. Although terrorist attacks were, and st


Recommended